0% found this document useful (0 votes)
16 views

Class notes 3

Uploaded by

sukhbadall41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Class notes 3

Uploaded by

sukhbadall41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Project Description

If you are undergraduate student, you can team up (at most 2


students for 1 team) to finish your project. Each team member
needs to submit his/her report onto blackboard independently
(even with the same content).

If you are graduate student, you must finish your project by


yourself.

You will choose a topic from one of the following categories:

1. Literature survey

2. Technical paper review (If you choose this category, you must choose a
paper from the conferences or journals given below and within the specified
publication dates.)

3. Implementation

Sample topics of each category:


1. Literature survey (Undergraduate Students Only):
Write a survey paper on a topic of your choice such as
 Malware and fixes
 DDoS attack and defense techniques
 Elliptic curve cryptography inspired protocols/applications (e.g.,
ECDSA)
 Differential privacy (e.g., centralized DP, distributed DP, local DP)
 Deep/machine learning security or privacy

The Literature Survey report should include the background, the state of
the art (possibly comparing the current methods), and the future trend
(preferably with your own opinion). The report should be at least 6 pages,
12-pt font size, and single-column single-spaced.

2. Technical paper review:


Review a security-related paper published between 2018 and now in any of
the following conferences or journals
 IEEE Symposium on Security & Privacy (S&P, Oakland)
 Network and Distributed System Security Symposium (NDSS)
 ACM Computer and Communications Security (CCS)
 USENIX Security Symposium
 ACM Transactions on Information and System Security (TISSEC)
 IEEE Transactions on Dependable and Secure Computing (TDSC)
 IEEE Transactions on Information Forensics and Security (TIFS)
 IEEE Journal on Selected Areas in Communications (JSAC)
(security/privacy related papers)
 ACM SIGCOMM (security/privacy related papers)
 AAAI Conference on Artificial Intelligence (AAAI, security and privacy
related papers)
 Conference on Neural Information Processing Systems (NeurIPS,
security and privacy related papers)
 International Conference on Machine Learning (ICML, security and
privacy related papers)
 International Joint Conferences on Artificial Intelligence (IJCAI,
security and privacy related papers)

To download IEEE papers, go to www.ieeexplore.ieee.org and search for the


conference/journal proceedings.
To download ACM papers, go to http://portal.acm.org and search for the
conference proceedings/transactions.
To download NDSS papers, go to www.isoc.org/isoc/conferences/ndss and
search the proceedings. You may not be able to access these websites
outside UH.

The Technical Paper Review report should include the background, the
state of the art, discussions about technical details (e.g., contributions,
limitations, strengths, or weaknesses), discussions about performance
evaluation, and discussions about potential improvement (preferably with
your own opinion). The paper should be at least 5 pages, 12-pt font size, and
single-column single-spaced.

3. Implementation:
 Measure and compare the time taken for encryption and decryption
using DES, 3DES and AES, with different input sizes. Analyze the
three algorithms and identify which component(s) made an algorithm
particularly fast/slow, weak/strong. You can implement your own
algorithms or use others’ implementation.
 Implement the five modes (ECB, CBC, CFB, OFB, CNT) using any
block cipher of your choice (DES, AES, IDEA). Try to use repeated
message blocks in different input messages and see the resulting
ciphertext. Try also to swap the ciphertext blocks and see the
decrypted messages.
 Reconstruct the simulations/experiments in a published prestigious
conference/journal research paper. The paper must be chosen from
the conferences or journals given above, i.e., conferences or journals
within the specified publication dates in Technical Paper Review
section.

You will write a report to show all your steps, results (you can copy screen),
analysis and conclusion. If you implement the algorithms on your own,
append your code to the report. If you use others’ implementation, cite the
sources.

The Implementation report should be at least 4 pages, 12-pt font size, and
single-column single-spaced (codes exclusive, i.e., codes are supposed to
be post as appendix, and cannot be accounted for the main body of the 4-
page report).

Your choice of topic is not limited to the sample topics I gave. You can
propose any topic that is related and interests you (subject to my approval)!
The deadline for submitting your final project is
11:59 PM Wednesday, May 5.

You might also like